El Diario del CISO Volumen 4 - 2018 | Page 9

Feds Charge Two ATM Jackpotting Malware Suspects Feds Dismantle Ukrainian's $530 Million Carding Empire Uber: 'No Justification' for Breach Cover-Up Thehackernews British Hacker 'Lauri Love' will not be extradited to US, Court Rules Cyber Espionage Group Targets Asian Countries With Bitcoin Mining Malware Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers Russian Scientists Arrested for Using Nuclear Weapon Facility to Mine Bitcoins Watch Out! New Cryptocurrency-Mining Android Malware is Spreading Rapidly Infosecurity-magazine Adobe Flash Zero-Day Spotted in the Wild Hiscox: Global Firms Still Struggling to Get Cyber-Ready NCSC’s ‘Active Cyber Defence’ Initiative Boasts Impressive First-Year Results NHS Trusts Have All Failed Cyber Essentials — Report Uber CISO: "No Justification" for Failure to Disclose Massive Breach Winter Olympics Attack Expands with Top-Tier Spyware Techrepublic 73% of firms fail cybersecurity readiness tests How artificial intelligence is unleashing a new type of cybercrime Report: Traditional cybersecurity costs enterprises a fortune and isn't helping that much Why cybersecurity skills should be taught at business schools Why it's important to avoid FUD fatigue and threat rigidity when making security decisions Threatpost IoT Security market expected to hit a CAGR of 14.9% from 2017 to 2027: Research Russian hackers exploit weakness in US cyber defense Uber says hackers behind 2016 data breach were in Canada, Florida SCMagazineUK First SCADA cryptominer seen in the wild Safer Internet Day: Data privacy is a necessity, not a luxury Securing your company culture Security shortage forces CISOs to increase reliance on machine learning Serious DoS flaw spotted in WordPress platform - affects most versions Computerweekly Belgian police share Cryakl ransomware keys More POS malware detected in the wild Security Think Tank: How to evolve SecOps capacity Security Think Tank: Take care of security basics before automating Third party cyber breach risk set to rise Healthcareinfosecurty Hospital Hit With Cryptocurrency Mining Malware Managing ‘Shadow IT’ Risks in Healthcare Settings Partners HealthCare Breach: Why So Long to Confirm? The Sorry State of Endpoint Security SCMagazine Hotspot Shield Vulnerability Could Reveal 'Juicy' Info About Users, Researcher Cybercriminals exploiting traditional trust measures for compromises, study Claims Insurance Customers' Personal Data Exposed Due to Misconfigured NAS MacUpdate hacked, cryptocurrency miner apps installed Server Leaky Amazon S3 Bucket Exposes Personal Data of 12,000 Social Media Mulvaney ditches CFPB's Equifax probe Influencers 9